Security Education for the new Generation
|
|
- Lillian Taylor
- 8 years ago
- Views:
Transcription
1 Security Education for the new Generation SESSION SESSION ID: ID: MASH-W02 Wednesday, Feb 26, 9:20 WEST 3018 Jacob West Chief Technology Officer HP Enterprise Security Products Matt Bishop Professor University of California, Davis
2 A Message from Matt Sorry I cannot be here! Jacob and I prepared the slides together, and have known each other for years. This talk represents our views. 2
3 Defining security State of play today Opportunities Existing resources 3 Conclusion
4 Security Stuff vs. Secure Stuff Security Stuff Responsible for security Focus on security activities Opportunities for apprenticeship Clear career path for the motivated Doing Stuff Securely Responsible for stuff Impact on security, but not focus Few opportunities to learn Hard to map interest to career
5 What Are We Talking About? Robust programming Programming that prevents abnormal termination or unexpected actions A secure program conforms to a security policy And implicitly requires robustness, but robust programming does not require such conformance Here, secure is used in the sense of robust
6 Why This Matters Example: Exploit a buffer overflow to force a program to do things it should not Definitely non-robust Does not handle invalid input properly Is it non-secure? That depends if one can Use the buffer overflow to do things that the security policy disallows (yes) Use the buffer overflow to do only things that I could already do (no)
7 Defining security State of play today Opportunities Existing resources 7 Conclusion
8 Problem: 84% of Breaches Target Software Networks Hardware Applications Security Measures Intellectual Property Switch/Router security Firewalls Customer NIPS/NIDS Data VPN Net-Forensics Anti-Virus/Anti-Spam Business DLP Processes Host FW Host IPS/IDS Trade Vuln. Assessment Secrets tools
9 Software Security Today The line between secure and insecure is often subtle Many seemingly non-security decisions impact security Small problems hurt a lot A single bad line of code can put a company in the news Smart people make dumb mistakes As a group, programmers repeat the same security mistakes over and over We need non-experts to get security right Security and development are both full time jobs
10 Becoming a Doctor years
11 Becoming a Programmer Enter Workforce 4 years Learn Everything On-the-Job Training? Certification?
12 Top 9 Undergraduate Computer Science Programs Required classes with security content Restricted electives with security content Restricted electives with security focus Berkeley Carnegie Mellon Cornell Georgia Tech Michigan MIT Stanford Illinois Austin
13 Top 9: Courses with Security as a Focus Junior/Seniors specialize Only 3 of 9 offer security track Cornell: Security & Trustworthy Systems Track (4 classes) Michigan: Security Track (4 classes) Austin: Information Security Certificate Program (5 classes) Berkeley Carnegie Mellon Graduate Cornell Georgia Michigan MIT Stanford Illinios Austin Undergraduate
14 Top 9: Courses Focus on Traditional Security Software security appears at 3 of 9 General Cryptography Network Web Forensics Software Mobile Privacy Policy/Risk
15 The Fundamental Problem We don t write software that is robust Some exceptions in special cases We don t build systems to meet security requirements Many different models for developing software
16 What Will Drive Improvement? Commercial Financial savings (avoid cleaning up messes) Simpler maintenance Improved reputation Government Financial savings (avoid cleaning up messes) Simpler maintenance National security Software liability?
17 Software Liability You can t say I m not responsible for anything Chain of distribution (e.g. supply chain) liability exists now You can limit liability somewhat by defining use and environment Then you re liable in that context but (probably) not in others It is coming... EULAs may not be enforceable (adhesion contracts)
18 So What s Holding Us Back? Commercial and Government Need to spend more money Longer time-to-market No legal liability for bad software Need to pay more attention to installation, maintenance, and use Lack of people to write good code
19 So What s Holding Us Back? Academia Robust coding not seen as integral to programming Textbooks loaded with examples of non-robust programming Lack of support for enforcing and grading for robust coding Ties into lack of graders who really know about this Lack of faculty who understand robust programming And intimidation factor for those who know they don t understand it
20 Lack of Resources Assurance costs! Industry expected to deliver secure, robust products without resources for the extra effort required to deliver them Academia expected to teach and reinforce robust programming without resources for the extra effort in supporting this
21 Lack of People Need to teach people how to write robust programming Need to emphasize the practice, both in education and industry Continuous practice is key to reinforcing, maintaining, extending skills
22 Defining security State of play today Opportunities Existing resources 27 Conclusion
23 Focus for Rest of Talk Everyone lacks resources! How can industry and government work with academia? Carrots, not sticks Security tuned to environment and use What is secure varies among companies and government organizations
24 What Do We Need to Teach Secure Programming? Summit on Education in Secure Software (SESS) Diana Burley The George Washington University Matt Bishop University of California at Davis Funded by NSF 60 participants: academia / industry / government nob.cs.ucdavis.edu/~bishop/notes/2011-sess/2011-sess.pdf
25 SESS Objectives Engage stakeholders from academia, industry, and government to discuss teaching secure programming Use discussion as basis for a collaborative effort to develop a comprehensive agenda for secure software education
26 Recommendations Increase faculty who understand the importance of secure coding Establish professional development opportunities for faculty Integrate computer security content into existing courses Provide faculty support for the inclusion of security content Require at least one computer security course for all college students
27 Recommendations Promote collaborative problem solving and solution sharing Encourage partnerships and collaborative curriculum development Use innovative teaching methods to strengthen the foundation of computer security knowledge Develop metrics to assess progress toward meeting educational goals Highlight the role that computer security professionals should play in key business decision making processes
28 Summary Holistic view of secure education suggests programmers and nonprogrammers alike must be educated in the core principles Structural enablers Cultural shift among faculty and industry stakeholders that supports the development of a holistic view of software security Identification of measurable objectives and corresponding measurements Development of national licensure programs Alignment of expectations for university education and realistic
29 What Can Academia Do? Include robustness in evaluation of programs and projects Create a secure programming clinic Like an English clinic, or a writing clinic for law schools Provide supplementary material for textbooks, classes These should emphasize robust programming
30 What Can Industry Do? Key is to show more than say secure development is important Make clear that the skills are important for hiring Mention their need in job openings Preference to those with skill in this also helps
31 Work With Students and Faculty Internships Students love these; good recruiting tool Tasks requiring robust programming emphasize its importance to students Help teach students Review students code Team with colleges in senior/capstone projects
32 What Will This Do? Increase student demand If students see it as important, they will ask about it in class, evaluate programs, faculty in part on it Increase your visibility Good recruiting tools A corporate good citizen
33 Government Support Act like an industry Government can also fund programs (e.g. DHS and the Software Assurance Curriculum Project) Programs should support future faculty (as well as engineers) People willing to commit to teaching Imperative: target funding towards this specific purpose Require funding to be used for supporting robust programming If done as adjunct, likely to disappear in the main purpose of the funding
34 Defining security State of play today Opportunities Existing resources 42 Conclusion
35 Existing Resources Industry academic enablement programs Tradeshows and conferences Competitions and contests Training and certification Specialized university programs
36 Industry Academic Enablement Programs Focused on facilitating university education in security Notable Programs Cisco IBM Delivery Methods Hewlett-Packard Microsoft Direct to students or young professionals with certification programs Define a methodology, enlist industry specialists to assist with delivery Collaborate with universities and non-profits on research
37 Tradeshows and Conferences Notable Conferences IEEE Symposium on Security and Privacy ACM Computer and Communications Security The Colloquium (Colloquium on Info. System Security Education) USENIX Security Symposium Goals Share advancements in research Enhance with curricula security-centric topics
38 Competitions and Contests Notable Competitions CyberPatriot National Collegiate Cyber Defense Competition UCSB ictf Cyber Security Awareness Week (CSAW) DEFCON Why Capture-the-Flag? Goal-oriented and rewards both participation and success Opportunity to network with peers and industry professionals
39 Training and Certification Notable Programs (ISC) 2 SANS Institute CompTIA Motivations and Objectives Industry effort to develop and ensure baseline skillsets Differentiate candidates for human resources and hiring managers Validate and recertify relevant security experience
40 Scholarship Programs Government Scholarships (for work commitment) CyberCorp: Scholarships for Service DOD Information Assurance Scholarship Program Private Scholarships (ISC) 2 Scholarships (Community College, Undergrad, Grad) Armed Forces Communications and Electronics Association (Community College, Undergrad, Grad) National Security Scholars Program (Undergrad) Symantec Graduate Fellowship (Grad) Applied Computer Security Associates (Undergrad, Grad)
41 Scholarship for Women Studying Information Security Support women with a demonstrated interest in security, through coursework, internships or work experience to complete a Bachelors or Masters degree Must be entering junior or senior year of Bachelors or first year of Masters Administered by Applied Computer Security Associates (ACSA) and Committee on the Status of Women in Computer Research (CRA-W) Awarded a single $10k scholarship annually pre-2014 Includes attendance at ACSA, CRAW, as well as internship opportunities
42 Defining security State of play today Opportunities Existing resources 71 Conclusion
43 Many Myths Myths about universities confuse how academia can put teaching secure programming into practice There is no room If students learn to write secure programs Academic institutions are We know what to do And some questionable ideas don t help either Testing students knowledge Unsupported mandates
44 Myth #1 There is no room in curricula for a course on secure programming You don t need a separate course Simply check programs submitted during all courses for robustness Make writing robust programs beneficial (through grades or other mechanisms) Provide resources so students can see how to do this, or get help to do it
45 Myth #2 If students learn to write secure programs, the state of software and system security will dramatically improve Will companies accept increased cost, time to market? Will customers pay higher prices, endure longer development times? Will students be encouraged (required) to practice what they learned?
46 Myth #3 Academic institutions are hierarchical in organization Implication is that deans, provosts, presidents can order this taught Learning styles, environments differ May not be a 'best' or 'right' way to teach this
47 Myth #4 We know what to do and how to do it We have ideas, but don t know Needed: research on education Needed: funding, people to do this The Summit on Education in Secure Software suggested ways to do this SESS results are general Approaches must be tailored to various environments
48 Questionable Idea #1 Testing students knowledge Who creates the tests? Who is being tested? How do you know that you are testing what is important? (that is, the right thing ) Who determines what is an acceptable result? Teaching to the test, rather than to learn the material
49 Questionable Idea #2 Unsupported mandates The support has to come from somewhere It s like a zero-sum game What do you want to weaken? If you only have so many resources, something will have to give You don t want to weaken the core foundation of understanding why certain programming paradigms are critical
50 Conclusion We must all hang together, or we shall all hang separately. - Benjamin Franklin The state of practice can, and must, change Understand that academia is a different environment completely Teaching robust programming, and nothing more, will not help The marketplace must also change, as must current practice The public will be the main driver (unfortunately, probably with lawsuits)
51 Questions? SESSION ID: Jacob West Chief Technology Officer HP Enterprise Security Products Matt Bishop Professor University of California, Davis
Secure Programming: A Way of Life (or Death) Matt Bishop Computer Security Laboratory Dept. of Computer Science University of California at Davis
Secure Programming: A Way of Life (or Death) Matt Bishop Disclaimer ä All opinions expressed here are not necessarily those of the: ä ä Department of Computer Science ä University of California ä Any other
More informationHP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
More informationCollege of Business. 2014 AACSB Continuous Improvement Review Accreditation Report
College of Business 2014 AACSB Continuous Improvement Review Accreditation Report Accreditation Review Result Accreditation extended for another five years Next review occurs in the 2019 2020 academic
More informationInformation Assurance Curricula and Certifications
Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been
More informationGraduate Program Review of EE and CS
Graduate Program Review of EE and CS The site visit for the Graduate Program Review of Electrical Engineering and Computer Science took place on April 3-4. It included meetings with many constituencies
More informationProposal for Differential Tuition Dwight Look College of Engineering Texas A&M University November 2010
Proposal for Differential Tuition Dwight Look College of Engineering Texas A&M University November 2010 Background The Dwight Look College of Engineering is very highly ranked and is the second largest
More informationM.S. in Computational Finance and Risk Management University of Washington Seattle
May 2011 M.S. in Computational Finance and Risk Management University of Washington Seattle Introduction University of Washington (UW) proposes to offer a Master of Science in Computational Finance and
More informationHR 2272 Conference Report STEM Education Provisions Summary
HR 2272 Conference Report STEM Education Provisions Summary Title I Office of Science and Technology Policy (OSTP) Directs the President to convene a National Science and Technology Summit not more than
More informationLink to University's Strategic Plan (Strategy #) Goal 1.1 Strategy 1.1.1
Mission Statement: The mission of the College of Engineering is to provide an innovative academic program of excellence at both the undergraduate and graduate levels, judged by the highest standards in
More informationBecoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Date: November 6, 2014 MICHAEL ROCHA Education B.S. Administration, Concentration in Cyber Security California State University, San Bernardino
More informationCOMING TOGETHER, ENVISIONING THE FUTURE: THE STRATEGIC PLAN OF THE DEPARTMENT OF COMMUNICATION, UNIVERSITY OF MARYLAND
COMING TOGETHER, ENVISIONING THE FUTURE: THE STRATEGIC PLAN OF THE DEPARTMENT OF COMMUNICATION, UNIVERSITY OF MARYLAND CONTENTS INTRODUCTION 1 MISSION & VISION 1 STRENGTHS, CONSTRAINTS, OPPORTUNITIES 2
More informationMinority Degree Attainment in IT: What the National Data Show
Minority Degree Attainment in IT: What the National Data Show Presented to League for Innovation Innovations Conference Session on Degrees Matter: Minority Attainment in Occupational Education March 17,
More informationRealization of Your Dream: Higher Study, Partnership, Collaboration Opportunities
Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities Dr. Ashutosh Dutta, Ph.D. Lead Scientist, AT&T New Jersey, USA Email: ashutosh.dutta@ieee.org Realization of Your Dream
More informationDraft. Graduate Education Strategic Plan. Contents. DRAFT September 29, 2014
Graduate Education Strategic Plan Contents Vision... 3 Mission... 3 Guiding Principles... 3 Graduate Education at Georgia Tech... 4 Strategic Goals... 5 Goal 1: Deliver an educational experience that is
More informationDr. James R. Lumpkin, Dean
EXECUTIVE SUMMARY College of Business Louisiana Tech University Dr. James R. Lumpkin, Dean EXECUTIVE SUMMARY Overview Louisiana Tech University The Industrial Institute and College of Louisiana was founded
More informationParticipants: Introduction:
National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS
More informationEvolving Modalities for Doctoral Education
Evolving Modalities for Doctoral Education Charles McClintock Dean, Human & Organizational Development Fielding Graduate University Orlando L. Taylor President, Washington, DC Campus The Chicago School
More informationGraduate Education in Physics Conference: Sustaining Thriving Programs by Embracing Challenges and Opportunities in the 21 st Century
Graduate Education in Physics Conference: Sustaining Thriving Programs by Embracing Challenges and Opportunities in the 21 st Century Chandralekha Singh Department of Physics and Astronomy University of
More informationAchieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce
Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of (DHS) National Cybersecurity Education & Awareness Branch (CE&A) October 2014 Mid-South
More informationCyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
More informationBecoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
More informationDiscover Viterbi: Cyber Security Engineering & Informatics Programs
Discover Viterbi: Cyber Security Engineering & Informatics Programs Professor Cyrus Shahabi Professor Clifford Neuman Meghan Balding Graduate & Professional Programs November 11, 2015 WebEx Quick Facts
More informationBEST PRACTICES FOR BUSINESS SCHOOLS TO LEAD IN EXPANDING OPPORTUNTIES FOR WOMEN IN BUSINESS AND TO ADAPT TO THE 21 ST -CENTURY WORKFORCE
BEST PRACTICES FOR BUSINESS SCHOOLS TO LEAD IN EXPANDING OPPORTUNTIES FOR WOMEN IN BUSINESS AND TO ADAPT TO THE 21 ST -CENTURY WORKFORCE In order to identify strategies and best practices to better prepare
More informationFamily Leave Policy Proposal for Engineering and Public Policy Author: Rebecca Balebako
Family Leave Policy Proposal for Engineering and Public Policy Author: Rebecca Balebako Introduction Currently, Engineering and Public Policy (EPP) graduate students have no guidelines or policy for taking
More informationGraduate School Infosession Day One with Dr. Sheila Humphreys and Professor Mike Franklin
Graduate School Infosession Day One with Dr. Sheila Humphreys and Professor Mike Franklin =============================================== Resources available to you for applying to graduate school. ===============================================
More informationProfitable, secure, flexible career.
Master of Accounting Profitable, secure, flexible career. No business degree? No problem. Fact: Accounting has been ranked the third best career by U.S. News and World Report s 2014 Best Jobs issue. Fact:
More informationMASTER S VS. PH.D. WHICH ONE TO CHOOSE? HOW FAR TO GO? A.J. Brush, Microsoft Research Rita H. Wouhaybi, Intel Labs
MASTER S VS. PH.D. WHICH ONE TO CHOOSE? HOW FAR TO GO? A.J. Brush, Microsoft Research Rita H. Wouhaybi, Intel Labs Revisi:ng Choices Nearing the end of your first year in either a Ph.D. or MS program,
More informationNational Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
More informationNayda G. Santiago, PhD, PE, Associate Professor Electrical and Computer Engineering Department University of Puerto Rico, Mayaguez Campus Femprof
Nayda G. Santiago, PhD, PE, Associate Professor Electrical and Computer Engineering Department University of Puerto Rico, Mayaguez Campus Femprof Program, September 11, 2008 Convince students that graduate
More informationPhDs in Business. Working at the Frontiers of New Knowledge
PhDs in Business Working at the Frontiers of New Knowledge The primary source of this document came from a presentation at the University of Southern California for a Doctorate in Business Recruiting Forum
More informationThe National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
More informationThe GW CyberCorps Program
The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks
More informationNLN VISION: TRANSFORMING RESEARCH IN NURSING EDUCATION A Living Document from the National League for Nursing. NLN Board of Governors November 2012
NLN VISION: TRANSFORMING RESEARCH IN NURSING EDUCATION A Living Document from the National League for Nursing NLN Board of Governors November 2012 Purpose The health of the nation through improved patient
More informationComputer and Network Security in Higher Education
The Authors Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass, A Wiley Company.
More informationHow To Become A Security Professional
Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided
More informationMAYS BUSINESS SCHOOL STRATEGIC PLAN 2010
MAYS BUSINESS SCHOOL STRATEGIC PLAN 2010 STRATEGIC PLANNING PROCESS Our strategic planning process is driven by the mission of Mays Business School, which is to create knowledge and develop future ethical
More informationAC 2012-5061: EXPLORING THE DIVERSITY IN FACULTY CAREERS: FORMATIVE AND SUMMATIVE ASSESSMENT IN A PREPARING FU- TURE FACULTY COURSE
AC 2012-5061: EXPLORING THE DIVERSITY IN FACULTY CAREERS: FORMATIVE AND SUMMATIVE ASSESSMENT IN A PREPARING FU- TURE FACULTY COURSE Ms. Cyndi Lynch, Purdue University, West Lafayette Cyndi Lynch is the
More informationMEMORANDUM. Rename the Department of Civil and Construction Engineering to the Department of Civil, Construction and Environmental Engineering, ISU
MEMORANDUM To: From: Subject: Board of Regents Board Office Rename the Department of Civil and Construction Engineering to the Department of Civil, Construction and Environmental Engineering, ISU Date:
More informationGraduate Program Goals Statements School of Social Work College of Education and Human Development
Graduate Program Goals Statements School of Social Work College of Education and Human Development December 12, 2014 Program Youth Development Leadership (MEd) Master of Social Work (MSW) Doctorate in
More informationThe Role of NSF Advanced Technological Education Centers in National Cybersecurity Education Efforts
The Role of NSF Advanced Technological Education Centers in National Cybersecurity Education Efforts NICE Workshop, TRK2 September 19, 2013 Corby Hovis National Science Foundation Casey O Brien National
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X
More informationEvaluation of Intellectual Property Course Offerings for undergraduate engineering students in the Mid Atlantic Region
Evaluation of Intellectual Property Course Offerings for undergraduate engineering students in the Mid Atlantic Region Abstract S. Jimmy Gandhi, M.S, Stevens Institute of Technology Donald Merino, PhD,
More informationHUMAN RESOURCE MANAGEMENT AND DEVELOPMENT
NEW YORK UNIVERSITY SCHOOL OF CONTINUING AND PROFESSIONAL STUDIES MASTER OF SCIENCE IN HUMAN RESOURCE MANAGEMENT AND DEVELOPMENT DIVISION OF PROGRAMS IN BUSINESS MASTER OF SCIENCE IN HUMAN RESOURCE MANAGEMENT
More informationFISSEA March 20, 2013 Kathy Roberson SFS Program Manager kathy.roberson@opm.gov
CyberCorps : Scholarship For Service (SFS) FISSEA March 20, 2013 Kathy Roberson SFS Program Manager kathy.roberson@opm.gov 1 Program Vision To enhance the security of Federal critical information infrastructure
More informationPreparing for an Academic Job Search
Preparing for an Academic Job Search Nancy Ross, Associate Dean, College of Science Janis Terpenny, Assoc. Professor, Dept. Engineering Education Advance VT Graduate Student Lunch Seminar 10/4/07 Academic
More informationComparative Analysis of PhD programs in Engineering Education
Paper ID #13515 Comparative Analysis of PhD programs in Engineering Education Mr. Homero Gregorio Murzi, Virginia Tech PhD. student of Engineering Education at Virginia Tech. Mr. Prateek Shekhar, University
More informationPH.D. IN BUSINESS ADMINISTRATION
PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent
More informationBACHELOR OF ARCHITECTURAL STUDIES (BAS) SCHOOL OF ARCHITECTURE, UNIVERSITY OF WATERLOO
TWO-YEAR PROGRESS REPORT BACHELOR OF ARCHITECTURAL STUDIES (BAS) SCHOOL OF ARCHITECTURE, UNIVERSITY OF WATERLOO 1. INTRODUCTION As noted in the previous Report to the Senate Undergraduate Council of November
More informationMaster of Cyber Security
Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides
More informationOAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING
OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING Oakland University seeks an inspiring and visionary leader to serve as Dean of the School of Nursing. The Search Committee will begin reviewing applications
More informationA Guide to applying to US CS PhD programs for EngSci/ECE
A Guide to applying to US CS PhD programs for EngSci/ECE Sida Wang Nov, 2011 1 Why this guide? This guide dedicated to Toronto Engineering Science (EngSci) and ECE undergraduates who wants to apply to
More informationThe School of Education & Human Services The University of Michigan Flint Standards and Criteria for Promotion and Tenure
The School of Education & Human Services The University of Michigan Flint Standards and Criteria for Promotion and Tenure Introduction The primary mission of the University of Michigan Flint is to be the
More informationHP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA lvonstockhausen@hp.com +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA lvonstockhausen@hp.com +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
More informationKhade, Aly, & Murti Trends in Graduate Operations Management Curricula at Leading Universities in the United States
the somewhat harder concept, Just-in-Time manufacturing. By the beginning of the 90 s, the European Union (EU) was requiring ISO 9000 certification for products as a prerequisite for doing business with
More information27.9% of the graduates responded. Respondents. Degree Surveys with Salaries Male Average Female Average. Table of Contents
27.9% of the graduates responded Class # of Respondents % Males % Females Seniors 145 73.1% 26.9% Average Yearly Salary Salary Range Overall $125,457 $40,000 500,000 Male $132,434 $40,000 500,000 Female
More informationFast-track to Developing Supply Chain Management Professionals
Fast-track to Developing Supply Chain Management Professionals Speaker: Scott Reily Senior Vice President Logistics, Brookshire Grocery Company Speaker: Mark R. Miller, PhD, CLSSBB, CSTM, CSMS, CSEG Professor
More informationA Comparison of Selected Categories of Accreditation Standards of NAIT, TEC-ABET and AACSB
Volume 18, Number 3 - May 2002 to July 2002 A Comparison of Selected Categories of Accreditation Standards of NAIT, TEC-ABET and AACSB By Dr. C. Douglas Ward and Dr. John Dugger KEYWORD SEARCH Administration
More informationPhysics Careers. 2-Mar-2013 1
Physics Careers 2-Mar-2013 1 2 Class of 2011 About 50 grads, where did they go? 50% grad school in physics Schools: Stanford, Cornell, Princeton, Harvard, Caltech, Illinois, Northwestern, Michigan, Indiana,
More informationUniversity of Connecticut (Storrs & Regionals)
University of Connecticut (Storrs & Regionals) Summary of Recommended Institutional Fees Fiscal Years 2013-2014 Institutional fees require central administrative review and approval. The budgets for the
More informationRequest for Entitlement to Plan Bachelor of Science in Supply Chain Management University of Wisconsin Stout September 2008
1. What is the need for this program? Request for Entitlement to Plan Bachelor of Science in Supply Chain Management University of Wisconsin Stout September 2008 Businesses are requiring specialized skills
More informationScholarship for Service (SFS) PhD with Information Assurance (IA) Concentration*
Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration* University of North Texas (UNT) received a NSF award to provide scholarships, including stipends, tuition, health insurance,
More informationWe present the salient features of our 5 year plan in italics and for each item present its mid-term status in bold.
Department of Physics Graduate Program (PhD and MS) January 2015, Midterm Update for Five Year Plan (June 2012-2017) We present the salient features of our 5 year plan in italics and for each item present
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
More informationToward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
More informationPurdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015
Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015 Final Version 5.0: May 3, 2010 Computer science is a discipline that involves the understanding and design of
More informationMASTER OF ARTS DEGREE PROGRAMS
COLLEGE OF VISUAL ARTS AND DESIGN Department of Art Education and Art History MASTER OF ARTS DEGREE PROGRAMS Master of Arts in Art Education Master of Arts in Art History REQUIRED ACADEMIC BACKGROUND The
More informationNGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
More informationCONNECTING CAREER AND TECHNICAL EDUCATION WITH THE COLLEGE AND CAREER READINESS AGENDA
Introduction Policymakers and educators around the nation are wrestling with an important challenge how to raise expectations for high school achievement, while increasing relevance and engagement in learning
More informationDoctor of Philosophy (Ph.D.) in Art Education
COLLEGE OF VISUAL ARTS AND DESIGN Department of Art Education and Art History Doctor of Philosophy (Ph.D.) in Art Education A Ph.D. in art education gives one the opportunity to achieve a high level of
More informationSummit on Education in Secure Software Final Report
Summit on Education in Secure Software Final Report Dr. Diana L. Burley The George Washington University Dr. Matt Bishop University of California, Davis GW: UCD: Report GW-CSPRI-2011-7 Technical Report
More informationSchool of Public Policy University of Maryland Strategic Plan
School of Public Policy University of Maryland Strategic Plan Executive Summary The University of Maryland School of Public Policy launched work in 2005 to implement a tenyear strategic plan. This document
More informationSOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs
SOUTH DAKOTA BOARD OF REGENTS Committee on Academic and Student Affairs AGENDA ITEM: III A(3) DATE: April 3-4, 2013 ****************************************************************************** SUBJECT:
More informationSomeone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
More informationMaster s Degree Programs. Global Technology Leadership
Master s Degree Programs Global Technology Leadership Why BU? Consistently ranked among the most prestigious graduate engineering programs in the U.S. Study with the Best Work with renowned faculty and
More informationMSU College of Engineering, Fall 2015
MSU College of Engineering, Fall 2015 ADGS BAE BME CHEM S CEE CMSE CSE ECE ME 1 Director for Graduate Initiatives, College of Engineering Recruit new graduate students to MSU Engineering Coordinate summer
More informationDIFFERENTIAL TUITION REQUEST
Page 203 of 342 University: UNIVERSITY OF ARIZONA DIFFERENTIAL TUITION REQUEST College/School: Program: College of Architecture and Landscape Architecture Bachelor of Architecture Is this for the graduate
More informationStatement of. William D. Green. Executive Chairman of the Board, Accenture. and
Statement of William D. Green Executive Chairman of the Board, Accenture and Member, Committee on Research Universities Board on Higher Education and Workforce Policy and Global Affairs National Research
More informationSecurity Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com
More informationExploring a National Cyber Security Exercise for Community Colleges
Exploring a National Cyber Security Exercise for Community Colleges Casey W. O'Brien Co-PI, CyberWatch Center Community College of Baltimore County Baltimore, Maryland :: CyberWatch :: Current Cyber Exercise
More informationHow To Increase A Nursing Program Fee At The University Of Azar
EXECUTIVE SUMMARY Page 1 of 9 Item Name: ADJUSTMENTS TO DIFFERENTIAL TUITION AND SPECIAL PROGRAM FEES FOR THE 2009-2010 ACADEMIC YEAR (UA). Action Item Discussion Item Information Item Issue: The Board
More informationThe University of California at Berkeley. A Brief Overview July 2007 For Presentation in Tokyo by Professor Stephen Cohen
The University of California at Berkeley. A Brief Overview July 2007 For Presentation in Tokyo by Professor Stephen Cohen 1 Universities Ranked by Number of Graduate Departments in Top 10 1. Berkeley (35)
More informationCelebrating Partnerships: 2015 NACME Continuum Meeting
Celebrating Partnerships: 2015 NACME Continuum Meeting Falls Church Marriott, Fairview Park Falls Church, VA October 13-14, 2015 Corporate Sponsor 2 Scholarship Program (2010-2015) Purpose Increase awareness
More informationAcademic and Professional Degree Students
Accountability Subreport on Academic and Professional Degree Students Steven Beckwith Vice President for Research & Graduate Studies Graduate Studies at UC Under the Master Plan, UC is responsible for
More informationInsert sponsor logo here. Dell SecureWorks. 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved.
Insert sponsor logo here Bye-Bye Budget: Top spending mistakes that put your budget at risk Matt Anthony Dell SecureWorks Today s webinar: Text in questions using the Ask A Question button All audio is
More informationThe life of a physics graduate student, or what I do
The life of a physics graduate student, or what I do My undergraduate thesis was on ultra high energy neutrinos in Super-Kamiokande The summer after graduation, I looked at the capture rate of µ - in MiniBooNE
More informationApplying to Graduate School Frequently Asked Questions 1. What are the differences between Master s, PhD, and MFA programs?
1 Applying to Graduate School Frequently Asked Questions 1. What are the differences between Master s, PhD, and MFA programs? The main difference between master s and doctoral programs has to do with the
More informationSCHOOL OF BUSINESS STATE UNIVERSITY OF NEW YORK AT NEW PALTZ
SCHOOL OF BUSINESS STATE UNIVERSITY OF NEW YORK AT NEW PALTZ Five-Year Strategic Plan Revised June 1, 2008 by Chih-Yang Tsai, Associate Dean This strategic plan for the School of Business is the result
More informationOur Mission To provide leadership, resources, and support for academically rigorous graduate study. *************
Our Vision To serve as a model unit of support, service, and stewardship of excellence in graduate education to meet the intellectual, academic, and vocational needs of students in the region and beyond.
More informationUniversity-Industry Work Group: Education
University-Industry Work Group: Education Tanya Zlateva Director, Center for Reliable Information Systems and Cyber Security (RISCS) Associate Dean for Academic Programs, Metropolitan College (MET) Boston
More informationMBAs for Specialized Audiences
MBAs for Specialized Audiences The STEM MBA at Texas Tech University Mary Frances Weatherly Senior Director Bill Pasewark Associate Dean June 15, 2015 Purpose Discuss the trend in specialized MBA programs.
More informationJournal of Homeland Security and Emergency Management
Journal of Homeland Security and Emergency Management Volume 8, Issue 2 2011 Article 9 FUTURE OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT EDUCATION Professional Education for Emergency Managers William
More informationQuality Graduate Programs and Their Role in Undergraduate Education at Clemson
+ Quality Graduate Programs and Their Role in Undergraduate Education at Clemson Dr. David Blakesley Faculty Representative to the Board of Trustees Clemson University + Graduate and Undergraduate Shared
More informationGraduate Curriculum Issues Allen Goldman, U of Minnesota
Graduate Curriculum Issues Allen Goldman, U of Minnesota At Minnesota we have been carefully scrutinizing our Graduate Curriculum for a few reasons: Committee on the Status of Women in Physics Site Visit
More informationEmployee Surveys: Four Do s and Don ts. Alec Levenson
Employee Surveys: Four Do s and Don ts Alec Levenson Center for Effective Organizations University of Southern California 3415 S. Figueroa Street, DCC 200 Los Angeles, CA 90089 USA Phone: 1-213-740-9814
More informationSTATE OF IOWA JUNE 8, 2011 UNDERGRADUATE AND GRADUATE PROGRAMS IN THE COLLEGE OF BUSINESS ACCREDITATION REPORT AT IOWA STATE UNIVERSITY
STATE OF IOWA JUNE 8, 2011 Contact: Diana Gonzalez UNDERGRADUATE AND GRADUATE PROGRAMS IN THE COLLEGE OF BUSINESS ACCREDITATION REPORT AT IOWA STATE UNIVERSITY Action Requested: Receive the accreditation
More informationSchool of Accounting Florida International University Strategic Plan 2012-2017
School of Accounting Florida International University Strategic Plan 2012-2017 As Florida International University implements its Worlds Ahead strategic plan, the School of Accounting (SOA) will pursue
More informationDEAN OF THE SCHOOL OF HEALTH SCIENCES
OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF HEALTH SCIENCES Oakland University seeks an inspiring and visionary leader to serve as Dean of the School of Health Sciences. The Search Committee will begin reviewing
More informationTO MEMBERS OF THE COMMITTEE ON EDUCATIONAL POLICY: DISCUSSION ITEM FUNDING UNIVERSITY OF CALIFORNIA GRADUATE ACADEMIC STUDENTS EXECUTIVE SUMMARY
E2 Office of the President TO MEMBERS OF THE COMMITTEE ON EDUCATIONAL POLICY: For Meeting of DISCUSSION ITEM FUNDING UNIVERSITY OF CALIFORNIA GRADUATE ACADEMIC STUDENTS EXECUTIVE SUMMARY There has been
More informationSystems Engineering Beyond Aerospace and Defense
Systems Engineering Beyond Aerospace and Defense Don S. Gelosh Ph.D., CSEP-Acq. White Paper Systems Engineering Beyond Aerospace and Defense By Don S. Gelosh, Ph.D., CSEP-Acq. Director, Systems Engineering
More informationAn Integrated Process Safety Curriculum: It s more than just technical content! Outline of Talk
An Integrated Process Safety Curriculum: It s more than just technical content! Daniel A. Crowl Herbert H. Dow Professor for Chemical Process Safety Department of Chemical Engineering Michigan Technological
More information